Security of Feistel Schemes with New and Various Tools.
Rodolphe LampeJacques PatarinPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security requirements
- access control
- software tools
- information security
- network security
- security analysis
- intrusion detection
- end users
- security issues
- security policies
- user friendly
- building blocks
- source code
- key management
- computer security
- data mining
- cyber attacks
- security level
- security problems
- key management scheme